-
21
Contemporary musicians. Volume 25 : profiles of the people in music
Detroit, Mich. : Gale Group, 1999Table of Contents: “…Geils Band -- Alan Jackson -- Jewel -- Kiss -- Mark Knopfler -- kd Lang -- Nils Lofgren -- Nick Lowe -- Little Willie John -- Martha and the Vandellas -- Pietro Mascagni -- Tommy McClennan -- Clyde McPhatter -- Memphis Jug Band -- Memphis Minnie -- Natalie Merchant -- Morcheeba -- Fats Navarro -- 'N Sync -- Stevie Nicks -- Danilo Perez -- Phish -- The Platters -- Lloyd Price -- Giacomo Puccini -- Puff Daddy -- Rammstein -- Maurice Ravel -- Joshua Redman -- R.E.M. -- Chris Rice -- Run DMC -- Pee Wee Russell -- Camille Saint-Saens -- Erik Satie -- Peggy Seeger -- Bruce Springsteen -- Richard Strauss -- Supertramp -- Tampa Red -- James Taylor --- Third Eye Blind -- Pam Tillis -- Chucho Valdes -- Van Halen -- Robbie Williams -- Trisha Yearwood.…”
Format: Electronic eBookAccess E-Book
-
22
Contemporary musicians. Volume 13 : profiles of the people in music
Detroit, Mich. : Gale Research, 1995Table of Contents: “…Adam Ant -- Mildred Bailey -- Chet Baker -- Afrika Bambaataa -- Joanie Bartels -- The Bellamy Brothers -- Terence Blanchard -- Pat Boone -- Big Bill Broonzy -- Ruth Brown -- Grace Bumbry -- T Bone Burnett -- Tevin Campbell -- The Carpenters -- Peter Case -- The Charlatans -- Mark Chesnutt -- Van Cliburn -- Curve -- Dick Dale -- Iris DeMent -- Devo -- Eazy-E -- Einsturzende Neubauten -- David Foster -- Fugazi -- Gang Starr -- Gwar -- Roland Hayes -- Tish Hinojosa -- Lightnin' Hopkins -- Jodeci -- Jerome Kern -- Nusrat Fateh Ali Khan -- Kool and the Gang -- Leo Kottke -- Gene Krupa -- Lerner and Loewe -- Steve Lillywhite -- Joe Lovano -- Lush -- Ellis Marsalis -- The Meat Puppets -- Johnny Mercer -- Charlie Musselwhite -- The O'Jays -- Pantera -- Phish -- The Proclaimers -- Della Reese -- Trent Reznor -- Sylvia Rhone -- Buddy Rich -- Nino Rota -- Sawyer Brown -- Gil Scott-Heron -- Jon Secada -- Paul Shaffer -- Shonen Knife -- Sly and Robbie --- Smashing Pumpkins -- Georg Solti -- Sounds of Blackness -- Mavis Staples -- The Story -- Billy Strayhorn -- Al B. …”
Format: Electronic eBookAccess E-Book
-
23
Fundamentals of information systems
Boston : Thomson/Course Technology, 2006Table of Contents: “…Ethical and Societal Issues: Phishing for Visa Card Customers --…”
Third edition.
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
24
PhanFood : from the kitchen pot to the tour lot
[Albany, N.Y.] : Excelsior Editions/State University of New York Press, 2010Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
25
PhanFood from the kitchen pot to the tour lot
[Albany, N.Y.] : Excelsior Editions/State University of New York Press, 2010Format: Electronic eBookAccess E-Book
-
26
Between Me and My Mind.
[San Francisco, California, USA] : Gravitas Ventures,; Kanopy Streaming, 2019; 2022Format: Electronic VideoStreaming video (Wentworth users only)
-
27
Outfox'em : Protecting Yourself and Your Family from Cyber Threats.
Newark : John Wiley & Sons, Incorporated, 2018Table of Contents:Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
28
Sc@mmed : online identity theft
New York, N.Y. : Films Media Group, 2007Table of Contents: “…Identity Theft Can Strike Anyone (1:55) -- Identity Theft Through Phishing (3:47) -- High Profits from Credit Card Theft (2:44) -- Tracking an Online Identity Thief (2:24) -- Challenges to Locating Cybercrooks (3:18) -- A Victim of Phishing and Online Credit Card Theft (3:50) -- How Online Identity Thieves Operate (1:47) -- Canadian Detectives Fight Cyber Crime (2:32) -- Responsibility for Protecting Identities (1:58)…”
Format: Electronic VideoStreaming video (Emerson users only)
-
29
Sc@mmed online identity theft
New York, N.Y. : Films Media Group, 2007Table of Contents: “…Identity Theft Can Strike Anyone (1:55) -- Identity Theft Through Phishing (3:47) -- High Profits from Credit Card Theft (2:44) -- Tracking an Online Identity Thief (2:24) -- Challenges to Locating Cybercrooks (3:18) -- A Victim of Phishing and Online Credit Card Theft (3:50) -- How Online Identity Thieves Operate (1:47) -- Canadian Detectives Fight Cyber Crime (2:32) -- Responsibility for Protecting Identities (1:58)…”
Format: Electronic VideoStreaming video (Emerson users only)
Streaming video (Wentworth users only)
-
30
Computer Security : QuickStudy Reference Guide.
Boca Raton : BarCharts, Inc., 2014Table of Contents: “…Introduction; Using This Guide; Related Terminology; Threats; Malware; Related Terminology: Malware; Malware: Types; Malware: Website Infection; Social Engineering; Impersonation; Shoulder Surfing; Spam; Phishing; Characteristics of Phishing Scams; Examples of Phishing Scams; Prevention & Protection; Security Plan; Security Responsibilities; Security vs. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
31
Proceedings of the 5th Brazilian Technology Symposium Emerging Trends, Issues, and Challenges in the Brazilian Technology, Volume 2
Cham : Springer International Publishing : Imprint: Springer, 2021Table of Contents: “…Resilient and Robust Control -- Vehicle Systems -- Smart System Architectures -- Smart Electricity -- Phishing Analytic and System Security -- Resource Management.…”
1st ed. 2021.
Format: Electronic eBookFull text (Wentworth users only)
Full text (Wentworth users only)
-
32
Information Security Education - Challenges in the Digital Age 16th IFIP WG 11.8 World Conference on Information Security Education, WISE 2024, Edinburgh, UK, June 12–14, 2024, Pro...
Cham : Springer Nature Switzerland : Imprint: Springer, 2024Table of Contents: “…. -- Using Visual Cues to Enhance Phishing Education for Children. -- Lessons Learnt from Using Educational Phishing Materials with UK Primary School Children. -- A framework for integrating gamification in information security awareness programmes for higher education students. -- Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults. -- Enhancing Awareness. -- Empirical evidence of fake news awareness levels among students. -- An In-Depth Analysis of Security and Privacy Concerns in Smart Home IoT Devices Through Expert User Interviews. -- Safeguarding Children’s Digital Privacy: Exploring Design Requirements for Effective Literacy Training for Parents. -- Digital Forensics and Investigation. -- Digital Detectives: A Serious Point-and-Click Game for Digital Forensics. -- Developing Digital Forensics Expertise Competencies Through Courtroom Role-Play. -- Cybersecurity Programs and Career Development. -- Assessing the cross-disciplinary accessibility of CyBOK. -- A Study on Exploring the Challenges of the CyberCorps®: Scholarship for Service Program to Support PhD Level Scholarships. -- The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity: Professionals’ Perspectives.…”
1st ed. 2024.
Format: Electronic eBookFull text (Wentworth users only)
-
33
Model-driven Simulation and Training Environments for Cybersecurity Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers
Cham : Springer International Publishing : Imprint: Springer, 2020Table of Contents: “…Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games – Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern–driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?.…”
1st ed. 2020.
Format: Electronic eBookFull text (Wentworth users only)
-
34
Deconstruction machines : writing in the age of cyberwar
Minneapolis, MN : University of Minnesota Press, 2018Table of Contents: “…Root kit -- Buffer overflow: the space and time of cyberwar -- Injection attack: writing and the information catastrophe -- Distributed denial of service: cybernetic sovereignty -- Spear phishing: nodal subjects -- Firmware vulnerabilities.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book
Full text (Wentworth users only)
-
35
JavaScript security : learn JavaScript security to make your web applications more secure
Birmingham [England] : Packt Publishing, 2014Table of Contents: “…Chapter 6: JavaScript PhishingWhat is JavaScript phishing?; Examples of JavaScript phishing; Classic examples; Accessing user history by accessing local state; XSS and CSRF; Intercepting events; Defending against JavaScript phishing; Upgrading to latest versions of web browsers; Recognizing real web pages; Protecting your site against XSS and CSRF; Avoid using pop ups and keep your address bars; Summary; Index…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
36
The revolution will not be televised : democracy, the Internet, and the overthrow of everything
New York : HarperPaperbacks, 2008Table of Contents: “…The moment : killer apps, open source, and the guy -- 5. Vermont : phish, chicken dinners, and the Deanie Babies -- 6. …”
Rev. ed.
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
37
Biography. Ben & Jerry
New York, NY : A&E Television Networks, 2005Format: Electronic VideoFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
38
Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings
Cham : Springer International Publishing : Imprint: Springer, 2015Table of Contents: “…Realism in Teaching Cyber security Research: The Agile Research Process -- Assurance Cases as a Didactic Tool for Information Security -- Cognitive Task Analysis Based Training for Cyber Situation Awareness -- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure -- Cyber security Through Secure Software Development -- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses -- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach -- Learn to Spot Phishing URLs with the Android No Phish App -- An Innovative Approach in Digital Forensic Education and Training -- On Experience of Using Distance Learning Technologies for Teaching Cryptology -- Reflections on the Ethical Content of the IT Honours Program Project Module -- Professional Competencies Level Assessment for Training of Masters in Information Security -- History of Cryptography in Syllabus on Information Security Training.…”
Format: Electronic eBookFull text (Wentworth users only)
-
39
Does the Internet increase crime?
Detroit : Greenhaven Press, 2010Table of Contents: “…Sex offenders prey on teenagers online / Bruce Bower -- The danger of Internet predators has been exaggerated / Larry Magid -- Online sexual abuse is a serious problem / Michael Scherer -- Sex offenders should not be banned from using the Internet / Declan McCullagh -- The Internet might reduce violence against women / Steve Chapman -- Online gambling leads to crime / Spencer Bachus -- Online poker is not a crime / Chris "Fox" Wallace -- Teen "sexting" is a crime / Missy Diaz -- "Phishing" can fool even experts / Tom Regan -- E-mail reform is necessary to prevent "phishing" / PR Newswire -- Cyberbullying is a menace to educators / Mary Bousted -- Cyberbullying should not be dealt with in courts / Emily Bazelon -- Developing countries pose a safety risk to western Internet users / Richard Bowman -- The economic downturn increases Internet crime / Karin Brulliard -- YouTube boosts rogue Internet pharmacies / Kristina Peterson ... …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
40
Cyber Security: The Lifeline of Information and Communication Technology
Cham : Springer International Publishing : Imprint: Springer, 2020Table of Contents: “…Introduction -- Cyber Threats and Attack Overview -- Phishing -- BOTNETS -- Copyright Infringement -- Cyber Forensics -- Trust Management -- Internet of Things (IoT) and Machine to Machine (M2M) Communication -- Smart Grid -- Cloud Computing -- Smart Devices -- E-Commerce -- Social Networking Sites -- Secure Incident Handling -- Exploiting Artificial Intelligence for Cyber Security -- Research Challenges and Future Scope.…”
1st ed. 2020.
Format: Electronic eBookFull text (Wentworth users only)